Automated password rotation with Wazuh and Shuffle

Automated password rotation with Wazuh and Shuffle

Post icon
/ Engineering
By

Automated password rotation helps protect both cloud and on-premises environments from unauthorized access and credential compromise by reducing the risk associated with exposed credentials. Suspicious or unrecognized login attempts may indicate stolen credentials, compromised accounts, or malicious insider activity. By proactively managing credentials and monitoring authentication events, organizations reduce the risk of insider threats while […]

Read more
Detecting Next.js CVE-2025-66478 RCE vulnerability with Wazuh

Detecting Next.js CVE-2025-66478 RCE vulnerability with Wazuh

Post icon
/ Engineering
By

A critical severity Remote Code Execution (RCE) vulnerability affecting Next.js applications that use the App Router has been identified. This vulnerability is rated CVSS 10.0, disclosed as CVE-2025-66478 and allows remote code execution (RCE) when attacker-controlled requests are processed in unpatched environments. It stems from an upstream vulnerability in the React Server Components (RSC) protocol […]

Read more
Detecting Chrome CVE-2025-13223 vulnerability with Wazuh

Detecting Chrome CVE-2025-13223 vulnerability with Wazuh

Post icon
/ Engineering
By

Another zero-day vulnerability tracked as CVE-2025-13223 has been discovered to affect Google Chrome and Chromium web browsers on Windows, macOS, and Linux endpoints. It follows the earlier disclosure of CVE-2025-4664, which also affects these web browsers. This is a high-severity flaw with a CVSS score of 8.8 reported to be actively exploited in the wild.  […]

Read more
Detecting and responding to Funklocker ransomware with Wazuh

Detecting and responding to Funklocker ransomware with Wazuh

Post icon
/ Engineering
By

Funklocker ransomware is a recently observed threat attributed to the FunkSec group, primarily targeting Windows environments. It is known for using AI-assisted code generation to produce new variants, which makes traditional signature-based defenses less effective. Funklocker ransomware uses living-off-the-land (LOTL) techniques by blending malicious activity with legitimate system functions to evade detection. This includes running […]

Read more
Monitoring Snowflake data warehouse with Wazuh

Monitoring Snowflake data warehouse with Wazuh

Post icon
/ Engineering
By

Snowflake is a fully managed, cloud-native data warehouse designed to handle structured and semi-structured data at massive scale. It separates storage from compute, allowing organizations to independently scale workloads such as data ingestion, analytics, machine learning, and reporting. It is a high-value target for attackers because it often centralizes critical business data such as financial […]

Read more
Improving IT hygiene using Wazuh 

Improving IT hygiene using Wazuh 

Post icon
/ Engineering
By

IT Hygiene is the practice of maintaining clean, consistent, and secure endpoint configurations across your infrastructure. Every endpoint in your environment is a potential entry point for attackers. A forgotten user account, an outdated package, a rogue service, or an unapproved browser extension can silently expose your organization to risk. Consistent visibility and control over […]

Read more
Wazuh agent deployment strategies for persistence in Kubernetes

Wazuh agent deployment strategies for persistence in Kubernetes

Post icon
/ Engineering
By and

The Wazuh agent is a component of the Wazuh SIEM and XDR solution that protects monitored endpoints such as servers, laptops, and virtual machines. Deploying Wazuh agents in containerized endpoints orchestrated by Kubernetes requires a more resilient deployment strategy. In containerized environments where workloads are ephemeral and dynamic, maintaining a persistent identity and configuration for […]

Read more
Detecting Maranhão Stealer with Wazuh

Detecting Maranhão Stealer with Wazuh

Post icon
/ Engineering
By

Maranhão Stealer is a Node.js-based infostealer delivered through pirated software and trojanized video game installers. Threat actors lure victims with cracked or modified game launchers that secretly install the malware on Windows systems. Once installed, Maranhão Stealer harvests sensitive data, such as browser credentials, cookies, cryptocurrency wallets, and other valuable information.  The malware targets common […]

Read more
Detecting Gunra ransomware with Wazuh

Detecting Gunra ransomware with Wazuh

Post icon
/ Engineering
By

Gunra ransomware is a recently identified threat that has been observed targeting Windows endpoints across multiple industries worldwide, including manufacturing and energy sectors. Known for its encryption capabilities and exfiltration tactics, the ransomware follows a double-extortion model, encrypting victim data while simultaneously threatening to leak stolen information on its Tor-hosted leak site. Gunra’s malicious behavior […]

Read more
Security observability on Linux with Wazuh and Tetragon

Security observability on Linux with Wazuh and Tetragon

Post icon
/ Engineering
By

Security observability allows security teams to gain comprehensive visibility into the security posture of systems, applications, and networks by collecting and analyzing telemetry from various sources. These data sources, including logs, metrics, and traces, provide deep insights into diagnosing system issues and investigating security incidents. They also help to detect and respond to potential threats […]

Read more
Detecting Koske malware with Wazuh

Detecting Koske malware with Wazuh

Post icon
/ Engineering
By

Koske malware is a new, trending malware that Aqua Nautilus first identified in July 2025. It is believed to be an AI-generated malware designed for cryptocurrency mining operations on Linux endpoints. The structure and characteristics of its code suggest that it may have been developed using large language models (LLMs) or automation frameworks. Koske is […]

Read more
Network security monitoring with Wazuh and Zeek

Network security monitoring with Wazuh and Zeek

Post icon
/ Engineering
By and

Network security focuses on ensuring the integrity, confidentiality, and availability of computer networks and data by preventing unauthorized access, misuse, or disruption. Continuous network monitoring provides visibility into network activity, enabling organizations to detect issues, optimize performance, and identify potential threats before they escalate into serious incidents. Wazuh is an open source SIEM/XDR platform that […]

Read more
Keep up to date
with our digest of articles